Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
North Korea Launches Malware to Steal Crypto Wallets Through Fake Job Sites

North Korea Launches Malware to Steal Crypto Wallets Through Fake Job Sites

KriptoworldKriptoworld2025/06/18 16:00
By:by Tatevik Avetisyan

North Korea-linked hackers are using a new malware to steal crypto wallet credentials from blockchain professionals.

Cybersecurity firm Cisco Talos reported the activity on June 19, 2025. The malware is named PylangGhost and is written in Python.

It allows attackers to control infected devices remotely and steal browser data and login credentials.

The attackers belong to a group called Famous Chollima, also known as Wagemole. Cisco Talos linked the group to North Korea.

The hackers targeted job seekers with crypto or blockchain experience. Most of the recent victims were located in India.

Cisco Talos said in the report:

“Based on the advertised positions, it is clear that the Famous Chollima is broadly targeting individuals with previous experience in cryptocurrency and blockchain technologies.”

Fake Crypto Job Sites Spread PylangGhost Malware

The hackers created fake crypto job sites that copy real companies such as Coinbase , Robinhood, and Uniswap.

Victims received messages from fake recruiters who asked them to visit websites for skills testing. The attackers used this step to gather information about the victims’ systems.

North Korea Launches Malware to Steal Crypto Wallets Through Fake Job Sites image 0 North Korea Launches Malware to Steal Crypto Wallets Through Fake Job Sites image 1 Malware Payload Download Commands. Source: Cisco Talos

After that, the victims were invited to video interviews. During the interviews, they were asked to enable camera and microphone access.

They were also tricked into copying and pasting commands into their systems. These commands pretended to install video drivers but instead installed the PylangGhost malware.

Cisco Talos included screenshots of the fake job sites and the malicious commands. The instructions looked like normal technical steps.

Malware Targets MetaMask and Password Managers

After installation, PylangGhost can take control of the device. It steals cookies and credentials from over 80 browser extensions.

These include crypto wallets and password managers such as MetaMask, 1Password, NordPass, Phantom wallet, Bitski, Initia, TronLink, and MultiverseX.

The malware is based on an earlier trojan called GolangGhost. Both versions allow remote access and perform tasks like file control, system monitoring, screenshot capture, and browser data theft. PylangGhost also enables the attacker to stay connected to the infected device.

Cisco Talos shared command-line instructions used to download the malware. These instructions were provided to victims as part of the fake video interview process.

Fake Interview Malware Still Common in Crypto Job Scams

Cisco Talos noted that the code structure in PylangGhost does not suggest the use of AI tools or large language models.

Manual development was used to build the malware. Comments found in the code support this finding.

This is not the first time crypto professionals were targeted through fake job listings.

In April 2025, hackers linked to the $1.4 billion Bybit theft used similar tactics. They distributed malware through fake recruitment tests to reach crypto developers.

The use of fake crypto job sites and interviews continues to be a method used by North Korean hacking groups.

These groups often impersonate companies and run long phishing campaigns aimed at those working in the crypto industry.

Cisco Talos included technical data, payload screenshots, and detailed malware behavior in the full report.


Disclosure:This article does not contain investment advice or recommendations. Every investment and trading move involves risk, and readers should conduct their own research when making a decision.

Kriptoworld.com accepts no liability for any errors in the articles or for any financial loss resulting from incorrect information.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

New spot margin trading pair — HOLO/USDT!

Bitget Announcement2025/09/12 07:46

FUN drops by 32.34% within 24 hours as it faces a steep short-term downturn

- FUN plunged 32.34% in 24 hours to $0.008938, marking a 541.8% monthly loss amid prolonged bearish trends. - Technical breakdowns, elevated selling pressure, and forced liquidations highlight deteriorating market sentiment and risk-off behavior. - Analysts identify key support below $0.0080 as critical, with bearish momentum confirmed by RSI (<30) and MACD indicators. - A trend-following backtest strategy proposes short positions based on technical signals to capitalize on extended downward trajectories.

Bitget-RWA2025/09/12 06:14
FUN drops by 32.34% within 24 hours as it faces a steep short-term downturn

OPEN has dropped by 189.51% within 24 hours during a significant market pullback

- OPEN's price plummeted 189.51% in 24 hours to $0.8907, marking its largest intraday decline in history. - The token fell 3793.63% over 7 days, matching identical monthly and yearly declines, signaling severe bearish momentum. - Technical analysts cite broken support levels and lack of bullish catalysts as key drivers of the sustained sell-off. - Absence of stabilizing volume or reversal patterns leaves the market vulnerable to further downward pressure.

Bitget-RWA2025/09/12 06:14
OPEN has dropped by 189.51% within 24 hours during a significant market pullback

New spot margin trading pair — LINEA/USDT!

Bitget Announcement2025/09/11 10:04